Episode 54: Jake Williams - IANS faculty member, former SANS educator, computer science and information security expert and U.S. Army veteran.
Secure Networks: Endace Packet Forensics Files
by Michael Morris
1M ago
In this episode of the Endace Packet Forensics Files, Michael chats with Jake Williams, aka @MalwareJake who delves into the concept of Zero Trust and its significance for organizations seeking to bolster their security defences. Discover how Zero Trust challenges traditional security models and learn about the crucial role of continuous verification and network visibility in mitigating threats. Gain valuable insights into networking fundamentals and the integration of cybersecurity principles from an industry veteran. Don't miss out on this opportunity to enhance your cybersecurity knowledge ..read more
Visit website
Episode 53: Tanya Janca - Head of Education and Community at Semgrep, Founder of WehackPurple, renowned cybersecurity expert, author and RSA Speaker.
Secure Networks: Endace Packet Forensics Files
by Michael Morris
2M ago
In this episode of Secure Networks, Michael chats with Tanya Janka, aka SheHacksPurple, head of education and community at Semgrep and founder of We Hack Purple. Tanya discusses her transition from developer to security expert, the real issues behind the cybersecurity skills gap, and strategies for employee retention. She also dives into the implications of emerging technologies on security practices and the balance between automation and human expertise. Don’t miss these valuable insights. Visit Tanya's websites:  ► We Hack Purple - [https://wehackpurple.com/]  ► Semgrep - [https ..read more
Visit website
Episode 51: Eric Buchaus, Director of Sales at Niagara Networks
Secure Networks: Endace Packet Forensics Files
by Michael Morris
5M ago
Are SPAN ports sufficient to provide network traffic visibility for high-quality security (NDR) and network (NPM) investigations? What about cloud workloads?  What do you need to gain insights into cloud network activity? In this episode of the Endace Packet Forensic Files, I talk with Eric Buchaus, Director of Sales at Niagara Networks. Eric outlines potential pitfalls and challenges associated with SPAN ports and highlights situations where they may fall short for network and security analysts. Eric walks us through some alternative options, discussing the merits of network TAPS, netwo ..read more
Visit website
Episode 50: Martyn Crew - Senior Director, Solutions Marketing and Partner Technologies at Gigamon
Secure Networks: Endace Packet Forensics Files
by Michael Morris
6M ago
In this episode of the Endace Packet Forensics Files, Michael Morris talks with Martyn Crew, Senior Director, Solutions Marketing and Partner Technologies at Gigamon, a 30-year veteran in the cyber security and network management space. Martyn shares his expertise on the limitations and risks associated with exclusively using log and meta-data as the primary resources for your security team's investigations. He discusses various use cases where network traffic and full packet data can play a crucial role in security investigations, highlighting the potential oversights that could occur when te ..read more
Visit website
Episode 49: ICS/SCADA security expert, Lionel Jacobs from Palo Alto Networks
Secure Networks: Endace Packet Forensics Files
by Michael Morris
7M ago
In this Episode of Packet Forensics Files, Endace's Michael Morris talks to Lionel Jacobs, Senior Partner Engineer, ICS and SCADA security expert, at Palo Alto Networks. Lionel draws on his more than 25 years of experience in OT and almost a decade at Palo Alto Networks in discussing some of the challenges of securing OT, IoT and critical infrastructure from cyber-attack. Lionel talks about the challenge of detecting attacks in OT environments, how to spot unusual activity, and the importance of having a reference baseline to compare against. He highlights the importance of packet data in pro ..read more
Visit website
Episode 48: Endace Security Manager, Al Edgar
Secure Networks: Endace Packet Forensics Files
by Michael Morris
8M ago
In this Episode of Packet Forensics Files, Michael Morris asks Al Edgar, former Information Security Manager for Health Alliance - and now IT Security Manager at Endace - about some of the important areas a security leader needs to focus on and what new challenges they are facing. Firstly,  Al says, it’s important to take an holistic approach to cybersecurity, by looking at the three critical components for robust security: people, processes, and technology. He stresses the importance of Incident Response planning and why it’s so critical to define clear objectives, roles, and responsibil ..read more
Visit website
Episode 47: Network forensics and incident response specialist, Jasper Bongertz
Secure Networks: Endace Packet Forensics Files
by Michael Morris
9M ago
What are some of the challenges of responding to a serious incident – such as a ransomware attack or advanced persistent attack? Where do you start, and what are the critical things you need to do? In this episode we are lucky to welcome Jasper Bongertz, Head of Digital Forensics and Incident Response at G DATA Advanced Analytics in Germany. Jasper has a wealth of experience from working in the front line of incident response at G DATA as well as in his previous role at Airbus. He also has a long background in network forensics – having been a Wireshark and network forensics instructor - and ..read more
Visit website
Episode 46: Gerald Combs, Wireshark and Stephen Donnelly, Endace
Secure Networks: Endace Packet Forensics Files
by Michael Morris
11M ago
How did Wireshark come to be, and what’s made it so successful – not just as the pre-eminent tool for analyzing network packet data, but as an open-source project in general? In this episode Michael Morris talks to Wireshark founder, Gerald Combs, and Endace CTO, Stephen Donnelly, about the origins of Wireshark, and why packet capture data is so crucial for investigating and resolving network security threats and network or application performance issues. Gerald talks about the early days of Ethereal, a “packet sniffer” he originally created for his own use in his role at an ISP, but subseque ..read more
Visit website
Episode 45: Dimitri McKay, Splunk
Secure Networks: Endace Packet Forensics Files
by Michael Morris
1y ago
Increasingly complex systems, expanding threat landscape, and explosion in the number of potential entry points all make managing security at scale a daunting prospect. So what can you do to implement effective security at scale and what are some of the pitfalls to avoid? In this episode Michael Morris talks with Dimitri McKay, Principal Security Strategist and CISO Advisor at Splunk, about where to start addressing the challenges of security at scale. He highlights the importance of robust risk assessment, developing clear security goals and ensuring leadership buy-in to the organization’s se ..read more
Visit website
Episode 44: David Monahan, Business Information Security Officer
Secure Networks: Endace Packet Forensics Files
by Michael Morris
1y ago
Cyberthreats are something all organizations are facing. But Pharmaceutical and Healthcare Providers have some unique challenges and vulnerabilities and come in for more than their fair share of attention from threat actors. What can your SOC team learn from some of the best practices these organizations are implementing? Are you architecting your environment to separate IOT devices from other critical assets and are you managing them with the same level of scrutiny? In this episode I talk with David Monahan, a 30-year expert in cybersecurity and network management and former researcher at Ent ..read more
Visit website

Follow Secure Networks: Endace Packet Forensics Files on FeedSpot

Continue with Google
Continue with Apple
OR